UPCOMING WEBINAR – Retail Under Siege: Fighting Back Against Ransomware With Next-Gen Forensics

Hero Image

Retailers face rising cyber threats—join Exterro's Sept 4 webinar to learn fast, modern forensic response strategies and protect your brand....

Digital Forensics Jobs Round-Up, August 18 2025

Digital Forensics Jobs Round-Up, August 18 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Enterprise Turns To AI For Speed And Accuracy In DFIR

Enterprise Turns To AI For Speed And Accuracy In DFIR

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....read more

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Overcoming Legal Challenges to the Authentication of Social Media Evidence

Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology and processes. This whitepaper examines these challenges faced by eDiscovery practitioners and investigators and illustrates best practices

Overcoming Potential Legal Challenges to the Authentication of Social Media Evidence

By John Patzakis1 Summary: Social media evidence is highly relevant to most legal disputes and broadly discoverable, but challenges lie in evidentiary authentication without best practices technology and processes. This whitepaper examines these challenges faced by eDiscovery practitioners and investigators

Dealing with Data Encryption in Criminal Cases

Over the last several years, I’ve posted a handful of short blog entries about the topic of compelling a criminal defendant to surrender a passphrase to an encrypted volume or hard-drive. These entries concern the three cases of re Grand

BlackBag Technologies Announces BlackLightâ„¢ 2012 R1 Release

BlackBag Technologies, Inc. today announced the immediate availability of BlackLight 2012 R1, a comprehensive iPhone, iPad, and Mac OS X forensic analysis tool. This latest release gives examiners additional ways to identify and locate important forensic evidence within large data

Dealing with Data Encryption in Criminal Cases

Introduction Over the last several years, I’ve posted a handful of short blog entries about the topic of compelling a criminal defendant to surrender a passphrase to an encrypted volume or hard-drive.  These entries concern the three cases of re

X-Ways Forensics v16.4 released

What’s new in v16.4? Performance A 64-bit edition of X-Ways Forensics and of the special WinHex version for licensed users of X-Ways Forensics is now available. You can simply add it to an installation of the 32-bit edition of X-Ways

XRY v6.2 Physical Released

Micro Systemation has just released its latest XRY forensic pack v6.2. The release includes enhanced physical extraction support for iOS & Android Devices, plus China Clone phones. One of the key new features is up to 4x faster dumping and

Belkasoft extends free license offer by two weeks

Belkasoft is extending their free license offer for two more weeks, offering free 6-month licenses for Evidence Center 2012 to eligible forensic and educational organizations. You may now get this product absolutely free, according to the offer at http://forensic.belkasoft.com/en/bec/en/free_evidence_center_for_le.asp, which

AccessData FTK 4.0: initial impressions

In this post, I will provide some initial impressions and findings. I do not endeavor to write a white paper, or to employ an industry standard, scientific methodology to evaluating the tool (if for no other reason than because I

Firefox Cache Format and Extraction

In the forensic lab where I work, we frequently investigate malware-infected workstations. As our user population started shifting from Internet Explorer to Firefox, we observed that one of our favorite forensic tools, Kristinn Gudjonsson’s log2timeline, wasn’t able to provide as

Forensics PhD studentship at Glasgow Caledonian University

Glasgow Caledonian University Interactive and Trustworthy Technologies Research Group are looking for PhD students. Projects are eligible for funded Glasgow Caledonian University PhD Scholarships. The scholarship covers Home/EU tuition fees and a stipend of £14,600 per annum for three years.

AccessData FTK 4.0: initial impressions

Introduction In this post, I will provide some initial impressions and findings.  I do not  endeavor to write a white paper, or to employ an industry standard, scientific methodology to evaluating the tool (if for no other reason than because

Interview with Jad Saliba, Founder and CTO, JADsoftware

Jad, can you tell us something about your background and how you became involved in digital forensics? It all started when I was a teenager and first got exposed to computers and software. I immediately was drawn to understanding how

Jad Saliba, Founder and CTO, JADsoftware

Jad, can you tell us something about your background and how you became involved in digital forensics? It all started when I was a teenager and first got exposed to computers and software. I immediately was drawn to understanding how

IAAC: Digital Evidence, Digital Investigation and E-Disclosure

Organisations and individuals currently have little idea how to collect and preserve evidence from computers and the Internet. As a result criminal prosecutions become difficult, businesses fail to get redress in the civil courts or are unable to make proper

Firefox Cache Format and Extraction

Introduction In the forensic lab where I work, we frequently investigate malware-infected workstations.  As our user population started shifting from Internet Explorer to Firefox, we observed that one of our favorite forensic tools, Kristinn Gudjonsson’s log2timeline, wasn’t able to provide